Precision and recall are two of the widest-used measurements of performance in machine learning and are also very relevant to cybersecurity applications.
Last week we heard of software companies around the world being breached due to a compromised software update process in SolarWinds Orion software. This tactic, which leverages the trust..
Asset-Based vs. Threat-Based Risk Management
Earlier in the week, it was reported that FireEye was breached – likely by Russian hackers. The hackers supposedly were seeking penetration testing tools used by FireEye’s services to probe..
Study Finds 2,200 Virtual Appliances with 400,000 Vulnerabilities and Outdated Software
In talking with many Chief Security Officers, we hear consistently that vulnerability prioritization is a difficult issue. Indeed, a recent study by the Ponemon Institute showed nearly 60% of..
Have you ever spoken to a salesman who starts the pitch using the term Machine Learning, but later switches to the term “Artificial Intelligence”? This seems rather imprecise – especially for..
In today’s video we discuss digital transformation for vulnerability management. We've summarized these concepts in an ebook for download as well as the video below.
In our business, we work with..
As a company’s number of remote employees grows, so does its attack surface. Researchers working for CYR3CON recently evaluated vulnerabilities associated with 343 common home routers spanning 24..
For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..